Results 21 to 30 of about 1,020 (118)
SHA-1 and MD5 Cryptographic Hash Functions: Security Overview
Despite their obsolescence and recommendations they are phased out from production environment, MD5 and SHA-1 cryptographic hash functions remain defaults frequently offered in many applications, e.g., database managers.
Roman Jasek
doaj +1 more source
Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones [PDF]
We present the forensic analysis of the artifacts generated on Android smartphones by ChatSecure, a secure Instant Messaging application that provides strong encryption for transmitted and locally-stored data to ensure the privacy of its users. We show
Anglano, Cosimo +2 more
core +2 more sources
Establecimiento de claves seguro mediante códigos sonoros en dispositivos móviles [PDF]
El objetivo de este trabajo ha sido investigar el uso de canales sonoros para el intercambio de claves en teléfonos inteligentes. Para ello, se ha realizado un diseño y un análisis del problema a resolver, teniendo en cuenta factores como la necesidad de
Agudo-Ruiz, Isaac, Ruiz Tueros, Ricardo
core +1 more source
Lightweight password hashing scheme for embedded systems [PDF]
Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized.
A Moradi +5 more
core +3 more sources
BootBandit: A macOS bootloader attack
Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a ...
Armen Boursalian, Mark Stamp
wiley +1 more source
Construction of a New Biometric‐Based Key Derivation Function and Its Application
Biometric data is user‐identifiable and therefore methods to use biometrics for authentication have been widely researched. Biometric cryptosystems allow for a user to derive a cryptographic key from noisy biometric data and perform a cryptographic task for authentication or encryption. The fuzzy extractor is known as a prominent biometric cryptosystem.
Minhye Seo +6 more
wiley +1 more source
RiffleScrambler - a memory-hard password storing function
We introduce RiffleScrambler: a new family of directed acyclic graphs and a corresponding data-independent memory hard function with password independent memory access. We prove its memory hardness in the random oracle model. RiffleScrambler is similar
D Aldous +6 more
core +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
Self-Enforcing Access Control for Encrypted RDF [PDF]
The amount of raw data exchanged via web protocols is steadily increasing. Although the Linked Data infrastructure could potentially be used to selectively share RDF data with different individuals or organisations, the primary focus remains on the ...
A Lewko +15 more
core +1 more source
Adding security and privacy to genomic information representation [PDF]
Provision of security and privacy to genomic data is a key issue in current genomic information representation. Existing formats do not give a solution to these issues (or they provide a partial one), so new solutions are demanded. MPEG-G (ISO/IEC 23092,
Delgado Mercè, Jaime +2 more
core +3 more sources

